Sciweavers

1050 search results - page 137 / 210
» Two methods of authenticated positioning
Sort
View
ENVSOFT
2006
125views more  ENVSOFT 2006»
15 years 1 months ago
Sensitivity analysis based on regional splits and regression trees (SARS-RT)
A global sensitivity analysis with regional properties is introduced. This method is demonstrated on two synthetic and one hydraulic example. It can be shown that an uncertainty a...
Florian Pappenberger, Ion Iorgulescu, Keith J. Bev...
CVPR
2010
IEEE
15 years 7 months ago
Latent Hierarchical Structural Learning for Object Detection
We present a latent hierarchical structural learning method for object detection. An object is represented by a mixture of hierarchical tree models where the nodes represent objec...
Leo Zhu, Yuanhao Chen, Antonio Torralba, Alan Yuil...
ECOOP
2005
Springer
15 years 7 months ago
Prototypes with Multiple Dispatch: An Expressive and Dynamic Object Model
Two object-oriented programming language paradigms— dynamic, prototype-based languages and multi-method languages— provide orthogonal benefits to software engineers. These two...
Lee Salzman, Jonathan Aldrich
BMCBI
2008
80views more  BMCBI 2008»
15 years 2 months ago
Computational evaluation of TIS annotation for prokaryotic genomes
Background: Accurate annotation of translation initiation sites (TISs) is essential for understanding the translation initiation mechanism. However, the reliability of TIS annotat...
Gang-Qing Hu, Xiaobin Zheng, Li-Ning Ju, Huaiqiu Z...
CVPR
2008
IEEE
16 years 3 months ago
SMRFI: Shape matching via registration of vector-valued feature images
We perform shape matching by transforming the problem of establishing shape correspondences into an image registration problem. At each vertex on the shape, we calculate a shape f...
Lisa Tang, Ghassan Hamarneh